author-image

Stephen Cooper

Stephen Cooper has taken a close interest in online security since his thesis on Internet encryption in the early 90s. That formed part of his BSC (Hons) in Computing and Informatics at the University of Plymouth. In those days, encapsulation techniques were just being formulated and Cooper kept an eye on those methodologies as they evolved into the VPN industry. Cooper went on to study an MSC in Advanced Manufacturing Systems and Kingston University. He also holds an MSc Advanced Security and Digital Forensics from Edinburgh Napier University.

Cooper worked as a technical consultant, sitting DBA exams and specializing in Oracle Applications. With a long experience as a programmer, Cooper is able to assess systems by breaking into programs and combing through the code. Knowledge of IT development and operations working practices helps him to focus his reviews on the attributes of software that are really important to IT professionals.

After working as an IT consultant across Europe and the USA, he has become adept at explaining complicated technology in everyday terms. He is a people person with an interest in technology

Articles by Stephen

Hackers have set up bases in hotels around the world in order to gain access to corporate networks through the devices that employees carry with them on their travels. Find out more about this threat and how you can protect your business from intruder attacks.
By Stephen Cooper in VPN & Privacy on December 28, 2023
Want a great streaming experience? We look at the best VPNs for IPTV, which keep you private and secure and allow you to stream from anywhere without sacrificing speed. 
By Stephen Cooper in VPN & Privacy on April 21, 2024
Free is always tempting, but when it comes to privacy and security, is it a risk worth taking? We review the best free VPNs for torrenting and also show you some of the best cheap VPNs as safer alternatives.
By Stephen Cooper in VPN & Privacy on April 17, 2024
UDP supports all media internet transfers. For years no one had a use for the User Datagram Protocol
By Stephen Cooper in Net Admin on August 11, 2022
TCP/IP underpins the internet and it can also help you manage your private network. Find out more about this protocol suite.
By Stephen Cooper in Net Admin on July 13, 2023
SFTP adds encryption to the more commonly used file transfer system, FTP. This command-line utility is very easy to use as long as you know the meaning of the commands. We show you how to navigate SFTP from the command-line.
By Stephen Cooper in Net Admin on December 27, 2023
Need to perform a scan to find the IP addresses of devices on your local network? We show you some manual command-line techniques, and we also take a closer look at the industry's leading port scanner and tracker tools.
By Stephen Cooper in Net Admin on January 8, 2024
Hesitant about implementing a BYOD management policy at your organization? This guide on BYOD solutions, software and management systems will keep you ahead of security threats.
By Stephen Cooper in Net Admin on March 22, 2024
DHCP Server Guide: We provide a thorough rundown of the Dynamic Host Configuration Protocol. Learn a
By Stephen Cooper in Net Admin on May 2, 2023
Page 47 of 56